Sciweavers

2904 search results - page 115 / 581
» Internet Infrastructure Security
Sort
View
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
15 years 6 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
ECIS
2001
15 years 2 months ago
The Fundamental Inadequacies of Conventional Public Key Infrastructure
It has been conventional wisdom that, for e-commerce to fulfil its potential, each party to a transaction must be confident about the identity of the others. Digital signature tec...
Roger Clarke
DBSEC
2003
113views Database» more  DBSEC 2003»
15 years 2 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
INFOCOM
2009
IEEE
15 years 8 months ago
Towards Economically Viable Infrastructure-Based Overlay Multicast Networks
—Internet-scale dissemination of streaming contents (e.g., live sports games) can be achieved by infrastructure-based overlay multicast networks, where multicast service provider...
Varun Khare, Bo Zhang
INFOCOM
2007
IEEE
15 years 7 months ago
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure
—It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their application...
Yao Zhao, Yan Chen